ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li

Similar documents
TECHNICAL DOCUMENTATION

Source Camera Identification Using Enhanced Sensor Pattern Noise

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

Introduction to Video Forgery Detection: Part I

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Colour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics

USER GUIDE. NEED HELP? Call us on +44 (0)

Camera identification from sensor fingerprints: why noise matters


Automatic source camera identification using the intrinsic lens radial distortion

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

ADVANCES in digital imaging technologies have led to

DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images.

Survey On Passive-Blind Image Forensics

ABC: Enabling Smartphone Authentication with Built-in Camera

Automation of JPEG Ghost Detection using Graph Based Segmentation

Mobile Camera Source Identification with SVD

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Source Camera Model Identification Using Features from contaminated Sensor Noise

arxiv: v1 [cs.cv] 15 Mar 2017

Multimedia Forensics

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images

Survey on Source Camera Identification Using SPN with PRNU

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

No-Reference Perceived Image Quality Algorithm for Demosaiced Images

Analysis on Color Filter Array Image Compression Methods

Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier

Retrieval of Large Scale Images and Camera Identification via Random Projections

Measurement of Texture Loss for JPEG 2000 Compression Peter D. Burns and Don Williams* Burns Digital Imaging and *Image Science Associates

Fragile Sensor Fingerprint Camera Identification

Image Forgery Detection Using Svm Classifier

Camera identification by grouping images from database, based on shared noise patterns

Scientific Working Group on Digital Evidence

DOTTORATO DI RICERCA IN INFORMATICA IX CICLO UNIVERSITA DEGLI STUDI DI SALERNO. Forensic Analysis for Digital Images.

Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Touchless Fingerprint Recognization System

Objective Evaluation of Edge Blur and Ringing Artefacts: Application to JPEG and JPEG 2000 Image Codecs

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Digital Cameras The Imaging Capture Path

Biometric Recognition: How Do I Know Who You Are?

Efficient Estimation of CFA Pattern Configuration in Digital Camera Images

Deconvolution , , Computational Photography Fall 2018, Lecture 12

Biometrics and Fingerprint Authentication Technical White Paper

This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that

Biometrics - A Tool in Fraud Prevention

Exposing Digital Forgeries from JPEG Ghosts

VISUAL sensor technologies have experienced tremendous

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Forgery Detection using Noise Inconsistency: A Review

brief history of photography foveon X3 imager technology description

Literature Survey on Image Manipulation Detection

Wavelet-based Image Splicing Forgery Detection

IMAGE SPLICING FORGERY DETECTION

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

Image Forensics: source identification and tampering detection

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Digital Image Processing and Machine Vision Fundamentals

Section 1. Multimedia Forensics Based on Intrinsic Data

Detection of Hue Modification Using Photo Response Non-Uniformity

EC-433 Digital Image Processing

Forensic Image and Video Processing. Dallas, AAFS, 17 February 2004.

Color image Demosaicing. CS 663, Ajit Rajwade

Distinguishing between Camera and Scanned Images by Means of Frequency Analysis

Smartphone image acquisition forensics using sensor fingerprint

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Background. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image

State Library of Queensland Digitisation Toolkit: Scanning and capture guide for image-based material

From Image to Sensor: Comparative Evaluation of Multiple PRNU Estimation Schemes for Identifying Sensors from NIR Iris Images

Interpolation of CFA Color Images with Hybrid Image Denoising

DIGITAL IMAGING. Handbook of. Wiley VOL 1: IMAGE CAPTURE AND STORAGE. Editor-in- Chief

SARG Smooth Snake ID Photo Guide

International Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X

Image Forensics of High Dynamic Range Imaging

MODULE No. 34: Digital Photography and Enhancement

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

How does prism technology help to achieve superior color image quality?

Biometric Recognition Techniques

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Journal of mathematics and computer science 11 (2014),

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

IMAGE RESTORATION WITH NEURAL NETWORKS. Orazio Gallo Work with Hang Zhao, Iuri Frosio, Jan Kautz

License Plate Localisation based on Morphological Operations

Content Based Image Retrieval Using Color Histogram

High-speed Micro-crack Detection of Solar Wafers with Variable Thickness

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Color Image Acquisition Sam Liebo Lead Application Engineer February 2019

Open Set Source Camera Attribution

Topic 9 - Sensors Within

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

STANDARDS? We don t need no stinkin standards! David Ski Witzke Vice President, Program Management FORAY Technologies

Feature Extraction of Human Lip Prints

Transcription:

ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick UK 1 1

Outline Device Fingerprints Multimedia Forensic Applications Source Device Verification Source Device Identification Common Source Inference Content Authentication Source-Oriented Image Clustering Conclusions Future Works 2 2

Why not Use Metadata - EXIF File Metadata is easily removable and replaceable. 3 3

Device Fingerprints Scene Demosaicking Post- Processing Photo Lens Color Filter Array Sensor Lens aberrations (accurate to device models) CFA + demosaicking artefacts (accurate to models) Quantisation table of JPEG (accurate to models) Sensor pattern noise (accurate to individual devices) 4 4

Sensor Pattern Noise (SPN) SPN is the invisible artifacts left in the images by the sensors of devices. SPN is mainly caused by manufacturing imperfection of silicon wafers and different sensitivity of pixels to light. Sensors made from the same silicon wafer produce unique SPN SPN can differentiate cameras of the same model. 5 5

SPN Extraction Lukáš et al s model for SPN extraction (IEEE TIFS 2006) SPN: n = I( i, j) - I' ( i, j) I ' = Weiner _ filter( I) I is the original image I is the low-pass filtered version of I SPN is the high-frequency component of the image. 6 6

Interference from Scene Details Scene details also contribute to the high-frequency components of images. natural images SPN clean SPN contaminated SPN 7 C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Trans. on Information Forensics and Security, 2010 7

Other Sources of Interference Periodical operation: e.g., JPEG, demosaicking Periodical artefacts before enhancement after enhancement X. Lin and C.-T. Li, "Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization," IEEE Trans. on Information Forensics and Security, 2016 C.-T. Li and Y. Li, "Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics," IEEE Trans. on Circuits and Systems for Video Technology, 2012 8 8

Other Sources of Interference Filters used in SPN extraction SPN: n = I( i, j) - I' ( i, j) I ' = Weiner _ filter( I) X. Lin and C.-T. Li, "Enhancing Sensor Pattern Noise via Filtering Distortion Removal," IEEE Signal Processing Letter, 2016 9 9

Source Device Verification Task: Determine whether a given image is taken with a particular device based on device fingerprints? Similarity: Normalized Cross Correlation SPN extractor r( i, j) = ( n i n i - ni ) ( n - n i n j j - n - n j j ) =? SPN extractor 10 Sensor pattern noise Sensor pattern noise 10

Source Device Identification Task: Given an image and the reference SPNs of k cameras, identify the camera that has taken the image? 11 11

Common Source Inference Task: determine whether two images are taken by the same camera or not without possessing the camera? unavailable 12 12

Real-World Applications Sussex Police (UK) Linking child pornography to an offender s mobile phone Leading to a 9-year prison sentence using SPN in 2014 Guildford Crown Court (UK) Linking a set of voyeuristic videos in the disk of a spy camera to another video store in the defendant s mobile phone original produced by the defendant s spy camera Defendant pleading guilty for installing spy camera in June 2016 13 13

Content Authentication Reference fingerprint of Camera C Forged image Images by the same camera C fingerprint of the forged image Authentication Map True positives False positives False negatives 14 14

Source-Oriented Image Clustering Objective: each formed group contains only images taken by the same camera Significance: establishing relationship among images Delivered to INTERPOL (Lyon, France) unavailable Clustering Module Image Database 15 15

Novelty of Our Clustering Alg X. Lin and C.-T. Li, "Large-Scale Image Clustering based on Camera Fingerprint, IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 793 808, April 2017 16 16

Conclusions Device fingerprint can facilitate Source Device Verification Source Device Identification Common Source Inference Content Authentication Source-Oriented Image Clustering Multimedia forensics through device fingerprint analysis is of great interest to law enforcement. The most promising fingerprint is SPN at the moments Many future works to be done 17 17

Future Works We have the following now: Lens aberrations Colour filter array (CFA) interpolation artefacts Camera Response Function (CRF) Quantisation table of JPEG compression Sensor pattern noise Any other modalities? Any way to fuse them? 18 18

Future Works Issues surrounding SPN: A compact representation of SPN is needed for fast search and clustering: SPN is as big as the host image SPN is removable: sensitive to compression, transcoding, blurring, etc. SPN is replaceable! 19 19